Month: August 2018

New Study Shows That the Global Cost of a Data Breach Is Up in 2018 The Ponemon Institute recently released its annual Cost of Data Breach Independent Study that was sponsored by IBM Security. This study included two new factors that impact data-breach costs: Artificial Intelligence (AI) and the all-encompassing use of Internet of Things […]

Whether it’s physical, virtual, or in the cloud, discovering and blocking sophisticated threats in the network is at the forefront of every company’s mind. However, businesses are finding that more and more data violations are taking place when network security centers on the edge of the network are not giving equal protection to the network […]

What’s A Blockchain? A “blockchain” is basically a financial record similar to that of a spreadsheet, only for bitcoins and other forms of cryptocurrency available publicly and online. As the use of cryptocurrencies has evolved, it has created some innovative business opportunities. According to MIT Technology Review, the transparency and trust created through them have […]

Girl Scouts of the USA recently announced the addition of 30 new badges now available for Girl Scouts aged 5-18. The new badges were created to address a number of today’s most important social issues, including environmental advocacy, cybersecurity, robotics, computer science, and space exploration, among others. Girl Scouts of the USA has long served […]

If you are connected to the internet, then you are a target for malware, viruses, and hackers. Every day, 350,000 new malware programs come to the surface. Your firewall and anti-virus protection can only provide so much security. That is why it is very important that you know how to spot fraudulent software and fake […]

What Do We Know About Terminal Fault (L1TF) Chip Vulnerabilities? Understanding The L1 Terminal Fault (L1TF) Intel has recently confirmed L1 Terminal Fault (L1TF) chip vulnerabilities in its processors that can be manipulated by malware and malevolent virtual machines with the intention of stealing private information from a computer’s memory. Who or What is Vulnerable? […]

Azure Stack has commanded plenty of loyal followers since its release, and it’s easy to see why. The platform provides many of the same great benefits users found in Microsoft’s Azure. Chief among them is the impact on multi-cloud environments. Building and deploying applications have become easier than ever before, and users are now able […]

Is It Safe For Me To Use The Airport’s Public Wi-Fi When I Travel? Most airports around the U.S. and abroad provide free Wi-Fi service to travelers stranded in their terminals, waiting for their flights. While this service may appear to be generous, a recent study by Coronet, a cybersecurity company, suggests you might want […]

What Are The New Updates On Microsoft Office 365 For August 2018? ﻿As Microsoft continually works on improving the Office 365 experience for its users, the new August 2018 updates include some helpful, fun, and entertaining new experiences for Microsoft Office 365 users. Let’s take a closer look at the new updates. Microsoft Whiteboard As […]

In a recent Forbes article, former VP of Strategic Communications at SAP, former Chief Communications Officer at Oracle, and current founder and president of Evans Strategic Communications LLC, Bob Evans, weighed in on the cloud wars between Amazon and Microsoft. Evans broke down the 10 key elements of Microsoft’s progress and strategy in the words […]

Solis Security Provides A Focused Set Of Managed IT And Cybersecurity Services Based On Your Organization’s Unique Needs. Whether You Need Technology Services In The Austin Area Or Anywhere Else, We Can Maintain And Support Your Technology Investments To Ensure Complete Security And Optimal Performance.

The Solis security website uses cookies to provide the best browsing experience and track key website data. Cookie-related data will not reveal your personal identity. Solis security employs third-party marketing tools and solutions to measure the effectiveness of our website, track key statistics regarding web visitors such as location, pages visited, technical web analytics and also to improve our overall marketing message. We employ Live Chat technologies to provide an immediate avenue for help and informaitn from Solis security. No personal information is shared until the website visitor offers to share. You are under no obligation to share any business information with Solis security. If you continue browsing our site, you are giving consent for the use of cookies and to allow Solis security to track information about your website visit.. For details, view our Privacy Policy and Ad and Cookie Policy.